Think Full Disk Encryption is Good Enough? Think Again. (2024)

Most often, the word “encryption” brings to mind decryption keys and complex processes that cause friction to the end users in order to access data. Because of the friction these processes create, it’s common for businesses to use alternate forms of encryption such as disk encryption to meet business or compliance requirements. Disk encryption protects information stored on a disk drive—such as an external hard drive, laptop, or even enterprise storage—by preventing the drive from being accessed without the proper password or authentication credentials.

While it is an effective way to protect data, disk encryption alone is simply not enough. In the past, encryption would often be too heavy or resource intensive to perform at extremely high volumes for high transaction volume organizations such as health insurers, card processors, or healthcare clearinghouses. In these cases, the volume of transactions and their low latency requirements were so at odds that using data-level encryption was just not a great option. Encrypting a disk, storage area network, or network-attached storage is a great security control in those environments, but it’s no longer good enough to be the only encryption solution in play.

The Reality of the Physical Risk

Often encrypt/decrypt mechanisms are tied to role-based access controls through an organization’s authentication, authorization, and accounting service (such as Active Directory). Only permitted roles have access to the data store and the decrypted data. Data at rest would be encrypted, and the keys protected, which means that if someone did gain access to the data store or the physical disks, the data would be worthless.

Physical obtainment of a disk or drive is still a critical thing to consider when developing your security programs, but companies also must consider if this is addressing a perceived risk or an actual one. The likelihood of physical tampering with disks exists, but the risk is quite minimal in environments such as professional data centers. These facilities often have impressive—albeit imperfect—physical security controls that minimize access to the actual hardware. A disk can be taken out for destruction and compromised that way as well, so the risk and impact are real, but the physical security measures are not protecting the data that’s at rest the way many organizations believe.

Cracking Credentials

According to a study by Dark Reading, phishing is responsible for over 50 percent of the data breaches across surveyed responders. Phishing is a common method used by criminals to obtain sensitive information in order to compromise an organization or individual. In today’s decentralized and often borderless world of access and connectivity, organizations use credentialed access to protect themselves from unauthorized parties. Once stolen, those credentials are keys to the castle. If other factors of authentication aren’t in place, or the compromise is initiated from within the organization in an area that doesn’t require authentication, that’s all an attacker needs to appear as if they are an authorized user of the system. Password spraying attacks will take previously compromised credentials, which are known to criminals already, and attempt to use them on other environments. Many individuals reuse passwords or use easily guessable passwords. The point is that often credentials are not enough when protecting your organization from the outside world.

Let’s say that an attacker uses a malicious link, download, or exploits a vulnerability to gain access to an organization, but they don’t necessarily have credentials. Hunting for credentials within many environments is not a difficult task. Misconfigurations that make those credentials easy to find are common. For example, insecure protocols such as SMB or NetBIOS can make gaining access as easy as sitting quietly on a system or network and listening, or executing a script downloaded from the internet. In a security mature organization, some of those issue may not exist or be exploitable. But consider what happens when the attacker spawns a fake login page on a workstation: The login page looks just like the traditional windows login, but takes the password and dumps it to an area that the attacker can access.

All of this gives proof to the fact that credentials are simply not enough anymore. Disk encryption typically and traditionally relies on user permissions and access to determine who can access and decrypt the data stored on the disk. Considering how easy it is to steal credentials today, are credentials proving to be valid keys for unlocking sensitive data? As a long time security practitioner, I have never been a fan of relying solely on disk encryption, as it often creates a false sense of security.

Enhancing Protection with Targeted Encryption

Encrypting the data itself with encryption mechanisms that are not directly connected to authentication credentials is key to helping to mitigate these issues. Can your encryption architecture vet decryption requests for who the individual is, where they are, and what type of data it is? This is a very difficult task, however it ultimately does address the risk in a much wider and more effective way than just disk encryption.

When using disk encryption, it would a be a huge lift to map data types to what’s encrypted and where: Disk encryption performs encryption on the disk itself, so the data typically would need to be parsed into partitions and isolated, then encrypted. How do you perform these tasks when your data is co-mingled, or different roles required different views of the same data set to be decrypted?

Encryption of the data at the element or column level across structured or unstructured data and in conjunction with masking can greatly reduce the reliance on disk encryption for meeting compliance and security program requirements to protect data. Performing more targeted encryption that automatically considers what data elements are present along with the user’s role is a top consideration to mature these operations across the entire enterprise.

Secure Files and Data with PKWARE

Targeted encryption begins with complete administrative control. Automated protection solutions such as PK Encryption, part of the PK Protect data discovery and protection solution suite, helps organizations define granular enterprise data protection policies and protect sensitive data at the element level wherever it is stored. PK Encryption provides businesses with the power to encrypt sensitive data in files and databases—as well as data that is being transmitted or moved—with decryption capabilities only for those with properly approved access. With options for persistent file and email encryption, format-preserving encryption, dynamic data encryption, and transparent data encryption, PK Encryption builds on existing disk encryption solutions to keep your data protected no matter how it is accessed and used, all without impacting how you do business.

Learn how PK Encryption can automatically protect your organization’s most sensitive data. Get a free personalized demo here.

Think Full Disk Encryption is Good Enough? Think Again. (2024)

FAQs

Is full disk encryption enough? ›

Invariably, entire disk encryption is the recommended way to go in order to enhance security. Here's why: Stronger Protection: A full disk encryption protects all the information that is stored on your hard drive such as mail, photos, videos, sensitive data, operating system, and even temporary files.

What are the disadvantages of full disk encryption? ›

Disadvantages. Some FDE programs can cause an increase in data access times. Slight delays in writing and reading data can occur, especially with very large files and high transaction volumes. System password management and key management processes have to be defined and put into place.

Why is full disk encryption important? ›

Full disk encryption protects the data on your device in the event it is lost or stolen. Without full disk encryption, if the data drive in the computer is removed, the data can be easily read and accessed.

Is encryption good enough? ›

It provides robust security during data transmission and safeguards against unauthorized access. However, encryption alone may not suffice when it comes to disposing of your computer.

Can full disk encryption be cracked? ›

Promo Protect all your devices, without slowing them down. Researchers at Netherlands-based Radboud University, which is active in almost all scientific fields, have discovered grave security flaws in several popular solid-state drives (SSD) that promise full disk encryption. In a nutshell, they can be cracked.

Is it worth encrypting a hard drive? ›

The Importance of Encryption

Encryption is the key to protecting the data on your hard drives. You can choose an encryption program that will make it more difficult for the thief to access the information, and prevent anyone who might find your portable drive from accessing it easily.

Can disk encryption be hacked? ›

Hackers can break encryption to access the data using a number of different methods. The most common method is stealing the encryption key itself. Another common way is intercepting the data either before it has been encrypted by the sender or after it has been decrypted by the recipient.

Does disk encryption slow down your PC? ›

And on modern hardware, encryption and decryption using the AES standard takes place in the CPU, which means that any impact on data transfer speeds is negligible.

How long does full disk encryption take? ›

How long will the encryption take? The length of time will depend on the size and speed of the hard drive in your computer. In our testing, the process has taken anywhere from 20 minutes to three hours.

Is full disk encryption better than secure boot? ›

Secure boot ensures the integrity of the boot process, preventing unauthorized software from running, while disk encryption safeguards the data stored on the disk, protecting it from unauthorized access.

What is the difference between disk encryption and full disk encryption? ›

Disk encryption or full disk encryption (FDE), as the name suggests is a method in which the entire disk gets encrypted. It differs from file encryption in the aspect that instead of individual files, the whole disk is encrypted and decrypted at once, including the operating system and related files.

Is full-disk encryption safe? ›

Security concerns

Even a Trusted Platform Module (TPM) is not effective against the attack, as the operating system needs to hold the decryption keys in memory in order to access the disk. Full disk encryption is also vulnerable when a computer is stolen when suspended.

What are the challenges of full-disk encryption? ›

Drawbacks of full-disk encryption

If users forget their password and lose their recovery key, the device will be inaccessible to them, and they will be locked out just like an intruder. Data in transit isn't protected, so data shared between devices and through email is still vulnerable to hacking.

What is the strongest encryption ever? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

Does full disk encryption protect against eavesdropping? ›

Encrypting the entire disk prevents unauthorized access to the data in case it's lost or stolen. It also protects against malicious tampering of the files contained on the disk.

Is 128 bit encryption good enough? ›

A 128-bit level of encryption has 2128 possible key combinations. AES is by far the most advanced encryption trusted by organizations worldwide. AES-128 is strong enough to meet future security needs.

Does full disk encryption affect performance? ›

Over the years we have noticed Encryption adversely affecting system performance - primarily in the read and write speeds. With some hard drives, this has been up to a 70% drop in speed.

Top Articles
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6580

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.